Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

3DS NAND SecureInfo Tool: Difference between revisions

From GameBrew
m (Text replacement - "Infobox 3DS homebrew" to "Infobox-3DS-Homebrews")
No edit summary
 
(11 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Infobox-3DS-Homebrews
{{Infobox 3DS Homebrews
| title = 3DS NAND SecureInfo Tool
|title=3DS NAND SecureInfo Tool
| image = https://dlhb.gamebrew.org/3dshomebrew/3DSNANDSecureInfoTool.jpg|250px
|image=3dspc.png
| type = PC Utilities
|description=SecureInfo_A extraction/injection tool.
| version = v15
|author=Riku
| licence = Mixed
|lastupdated=2015/03/14
| author = Riku
|type=File Operation
| website = https://gbatemp.net/threads/release-3ds-nand-secureinfo-tool-for-region-change.383792/
|version=15
| download = https://dlhb.gamebrew.org/3dshomebrew/3DSNANDSecureInfoTool.rar
|license=Mixed
| source = https://dlhb.gamebrew.org/3dshomebrew/3DSNANDSecureInfoTool.rar
|download=https://dlhb.gamebrew.org/3dshomebrews/3ds_secureinfo_tool_v15.rar
|website=https://gbatemp.net/threads/release-3ds-nand-secureinfo-tool-for-region-change.383792
}}
}}
<youtube>_dYks__1vCA</youtube>
{{Obsolete}}


Here's simple program I made for easy 'SecureInfo_A' extraction/injection I want to share. With it you don't need to worry about cutting/XORing whole FAT16 partition every time, just select untouched encrypted 'NAND.BIN' along with corresponding 'nand.fat16.xorpad' and in few seconds job is done.
This is a simple program for extracting/injecting [https://www.3dbrew.org/wiki/Nandrw/sys/SecureInfo_A SecureInfo_A] (4.x only). It simplify the process without having to about cutting/XORing whole FAT16 partition every time (it only requires the untouched encrypted NAND.BIN along with corresponding nand.fat16.xorpad).
�SecureInfo used for system region changing (JP/US/EU etc). Basically, you install few system CIA files for your target region (3DNUS/UpdateCDN), extract and inject new SecureInfo_A to emuNAND from target region donor, write emuNAND back and 'Format System Memory' in System Settings.
�'''Region Changing Steps:'''
1) Downgrade to 4.x FW and prepare 4.x emuNAND with DevMenu/BigBlueMenu
�2) Download and install following system CIAs using 3DNUS for desired region:


<div class="ToggleTriggerAnchor bbCodeSpoilerContainer">
SecureInfo used for system region changing (JP/US/EU etc). Basically, you install few system CIA files for your target region (3DNUS/UpdateCDN), extract and inject new SecureInfo_A to emuNAND from target region donor, write emuNAND back and Format System Memory in System Settings.


<span>Spoiler: <span class="SpoilerTitle">4.5.0-10J</span></span>
==User guide==
<div class="SpoilerTarget bbCodeSpoilerText">
First downgrade to 4.x FW and prepare 4.x emuNAND with DevMenu/BigBlueMenu.


0004001000020000 v3074
Then download and install following system CIAs using 3DNUS for desired region.
0004001000020100 v2051
0004001000020200 v2051
0004001000020300 v1024
0004001000020400 v2048
0004001000020500 v3072
0004001000020700 v1026
0004001000020800 v4096
0004001000020900 v6146
0004001000020a00 v2050
0004001000020b00 v1034
0004001000020d00 v1028
0004001000020e00 v1026
0004001000020f00 v1024
0004001000023000 v2048
0004001b00010702 v0
0004003000008202 v6146
0004003000008402 v1036
0004003000008602 v3072
0004003000008702 v2049
0004003000008802 v2050
0004003000008d02 v4099
0004003000008e02 v3075
000400300000c002 v2053
000400300000c003 v0
000400300000c102 v1026
000400300000c302 v1024
000400300000c402 v3
000400300000c502 v3074
000400300000c602 v2050
000400300000cd02 v1026
0004009b00010402 v3072
0004009b00010602 v2
0004009b00011902 v0
0004009b00012202 v4096
0004009b00013202 v0
0004009b00015202 v0
000400db00010302 v4096
000400db00010502 v6144
000400db00016202 v160
000400db00017202 v4176
0004013800000003 v5632
0004013800000102 v6704
0004800f484e4841 v8192


</div>
{| role="presentation" class="wikitable mw-collapsible mw-collapsed"|
! 4.5.0-10J
|-
| 0004001000020000 v3074
|-
| 0004001000020100 v2051
|-
| 0004001000020200 v2051
|-
| 0004001000020300 v1024
|-
| 0004001000020400 v2048
|-
| 0004001000020500 v3072
|-
| 0004001000020700 v1026
|-
| 0004001000020800 v4096
|-
| 0004001000020900 v6146
|-
| 0004001000020a00 v2050
|-
| 0004001000020b00 v1034
|-
| 0004001000020d00 v1028
|-
| 0004001000020e00 v1026
|-
| 0004001000020f00 v1024
|-
| 0004001000023000 v2048
|-
| 0004001b00010702 v0
|-
| 0004003000008202 v6146
|-
| 0004003000008402 v1036
|-
| 0004003000008602 v3072
|-
| 0004003000008702 v2049
|-
| 0004003000008802 v2050
|-
| 0004003000008d02 v4099
|-
| 0004003000008e02 v3075
|-
| 000400300000c002 v2053
|-
| 000400300000c003 v0
|-
| 000400300000c102 v1026
|-
| 000400300000c302 v1024
|-
| 000400300000c402 v3
|-
| 000400300000c502 v3074
|-
| 000400300000c602 v2050
|-
| 000400300000cd02 v1026
|-
| 0004009b00010402 v3072
|-
| 0004009b00010602 v2
|-
| 0004009b00011902 v0
|-
| 0004009b00012202 v4096
|-
| 0004009b00013202 v0
|-
| 0004009b00015202 v0
|-
| 000400db00010302 v4096
|-
| 000400db00010502 v6144
|-
| 000400db00016202 v160
|-
| 000400db00017202 v4176
|-
| 0004013800000003 v5632
|-
| 0004013800000102 v6704
|-
| 0004800f484e4841 v8192
|-
|}
{| role="presentation" class="wikitable mw-collapsible mw-collapsed"|
! 4.5.0-10E
|-
| 0004001000022000 v3075
|-
| 0004001000022100 v2051
|-
| 0004001000022200 v2054
|-
| 0004001000022300 v2050
|-
| 0004001000022400 v2048
|-
| 0004001000022500 v3072
|-
| 0004001000022700 v1026
|-
| 0004001000022800 v4096
|-
| 0004001000022900 v6146
|-
| 0004001000022a00 v2050
|-
| 0004001000022b00 v1034
|-
| 0004001000022d00 v1028
|-
| 0004001000022e00 v1026
|-
| 0004001000022f00 v1024
|-
| 0004001000025000 v2048
|-
| 0004001b00010702 v0
|-
| 0004003000009802 v6146
|-
| 0004003000009902 v1036
|-
| 0004003000009b02 v3072
|-
| 0004003000009c02 v2049
|-
| 0004003000009d02 v2050
|-
| 0004003000009f02 v4099
|-
| 000400300000a002 v3075
|-
| 000400300000c502 v3074
|-
| 000400300000cd02 v1026
|-
| 000400300000d002 v2053
|-
| 000400300000d003 v0
|-
| 000400300000d102 v1026
|-
| 000400300000d302 v1024
|-
| 000400300000d402 v3
|-
| 000400300000d602 v2050
|-
| 0004009b00010402 v3072
|-
| 0004009b00010602 v2
|-
| 0004009b00011202 v0
|-
| 0004009b00011302 v0
|-
| 0004009b00011502 v0
|-
| 0004009b00011702 v0
|-
| 0004009b00011802 v0
|-
| 0004009b00011b02 v0
|-
| 0004009b00011c02 v0
|-
| 0004009b00011d02 v0
|-
| 0004009b00012102 v4096
|-
| 0004009b00013102 v2049
|-
| 0004009b00015102 v1024
|-
| 000400db00010302 v4096
|-
| 000400db00010502 v6144
|-
| 000400db00016102 v160
|-
| 000400db00017102 v4176
|-
| 0004013800000002 v7712
|-
| 0004013800000003 v5632
|-
| 0004013800000102 v6704
|-
| 0004800f484e4841 v8192
|-
|}


</div>
Now extract your emuNAND from SD card, inject into emuNAND target region SecureInfo_A from donor system, insert emuNAND back to SD.
<div class="ToggleTriggerAnchor bbCodeSpoilerContainer">


<span>Spoiler: <span class="SpoilerTitle">4.5.0-10E</span></span>
Load emuNAND and perform Format System Memory/本体の初期化 in System Settings.
<div class="SpoilerTarget bbCodeSpoilerText">


0004001000022000 v3075
==External links==
0004001000022100 v2051
* GBAtemp - https://gbatemp.net/threads/release-3ds-nand-secureinfo-tool-for-region-change.383792
0004001000022200 v2054
0004001000022300 v2050
0004001000022400 v2048
0004001000022500 v3072
0004001000022700 v1026
0004001000022800 v4096
0004001000022900 v6146
0004001000022a00 v2050
0004001000022b00 v1034
0004001000022d00 v1028
0004001000022e00 v1026
0004001000022f00 v1024
0004001000025000 v2048
0004001b00010702 v0
0004003000009802 v6146
0004003000009902 v1036
0004003000009b02 v3072
0004003000009c02 v2049
0004003000009d02 v2050
0004003000009f02 v4099
000400300000a002 v3075
000400300000c502 v3074
000400300000cd02 v1026
000400300000d002 v2053
000400300000d003 v0
000400300000d102 v1026
000400300000d302 v1024
000400300000d402 v3
000400300000d602 v2050
0004009b00010402 v3072
0004009b00010602 v2
0004009b00011202 v0
0004009b00011302 v0
0004009b00011502 v0
0004009b00011702 v0
0004009b00011802 v0
0004009b00011b02 v0
0004009b00011c02 v0
0004009b00011d02 v0
0004009b00012102 v4096
0004009b00013102 v2049
0004009b00015102 v1024
000400db00010302 v4096
000400db00010502 v6144
000400db00016102 v160
000400db00017102 v4176
0004013800000002 v7712
0004013800000003 v5632
0004013800000102 v6704
0004800f484e4841 v8192
 
</div>
 
</div>
<div class="ToggleTriggerAnchor bbCodeSpoilerContainer">
 
<span>Spoiler: <span class="SpoilerTitle">4.5.0-10U</span></span>
<div class="SpoilerTarget bbCodeSpoilerText">
 
''Nothing here yet, may add later.''
 
</div>
 
</div>
3) Extract your emuNAND from SD card, inject into emuNAND target region 'SecureInfo_A' from donor system, insert emuNAND back to SD
�4) Load emuNAND and perform 'Format System Memory/本体��期化' in System Settings
<div class="messageTextEndMarker">
 
 
</div>

Latest revision as of 10:32, 22 Haziran 2024

3DS NAND SecureInfo Tool
3dspc.png
General
AuthorRiku
TypeFile Operation
Version15
LicenseMixed
Last Updated2015/03/14
Links
Download
Website

This is a simple program for extracting/injecting SecureInfo_A (4.x only). It simplify the process without having to about cutting/XORing whole FAT16 partition every time (it only requires the untouched encrypted NAND.BIN along with corresponding nand.fat16.xorpad).

SecureInfo used for system region changing (JP/US/EU etc). Basically, you install few system CIA files for your target region (3DNUS/UpdateCDN), extract and inject new SecureInfo_A to emuNAND from target region donor, write emuNAND back and Format System Memory in System Settings.

User guide

First downgrade to 4.x FW and prepare 4.x emuNAND with DevMenu/BigBlueMenu.

Then download and install following system CIAs using 3DNUS for desired region.

Now extract your emuNAND from SD card, inject into emuNAND target region SecureInfo_A from donor system, insert emuNAND back to SD.

Load emuNAND and perform Format System Memory/本体の初期化 in System Settings.

External links

Advertising: